Information Technology Journal1812-56381812-5646Asian Network for Scientific Information10.3923/itj.2011.648.655MudaZ. YassinW. SulaimanM. N.UdzirN. I.32011103Intrusion Detection Systems (IDS) have become an important building block of any sound defense network infrastructure. Malicious attacks have brought more adverse impacts on the networks than before, increasing the need for an effective approach to detect and identify such attacks more effectively. In this study two learning approaches, K-Means Clustering and Naïve Bayes classifier (KMNB) are used to perform intrusion detection. K-Means is used to identify groups of samples that behave similarly and dissimilarly such as malicious and non-malicious activity in the first stage while Naïve Bayes is used in the second stage to classify all data into correct class category. Experiments were performed with KDD Cup 99 data sets. The experimental results show that KMNB significantly improved and increased the accuracy, detection rate and false alarm of single Naïve Bayes classifier up to 99.6, 99.8 and 0.5%.]]>Ali, S.A., N. Sulaiman, A. Mustapha and N. Mustapha,2009812561262Anderberg, M.R.,1973pp: 359pp: 359Breiman, L., J.H. Friedman, R.A. Olshen and J. Stone,19841st Edn.,pp: 102-116pp: 102-116Chan, P.K., M.V. Mahoney and M.H. Arshad,2006Chen, Y., A. Abraham and B. Yang,200722337352Eric, B., A.D. Christiansen, W. Hill, C. Skorupka, L.M. Talbot and J. Tivel,20012001Eskin, E., A. Arnold, M. Preraua, L. Portnoy and S.J. Stolfo,2002Feng, H.H., O.M. Kolesnikov, P. Fogla, W. Lee and W. Gong,20032003pp: 6275Gandhi, M. and S.K. Srivatsa,200824960Wang, G., J. Hao, J. Ma and L. Huang,20103762256232Halkidi, M., Y. Batistakis and M. Vazirgiannis,200117107145Jain, A.K. and R. Dubes,1988John McHugh, A.C. and Julia Allen,2000174251Leung, K. and C. Leckie,20052005pp: 333342Lippmann, R.P., D.J. Fried, I. Graf, J.W. Haines and K.R. Kendall et al.,20002000pp: 1226Erman, J., M. Arlitt and A. Mahanti,20062006pp: 281286Panda, M. and M.R. Patra,20082008504507Peddabachigari, S., A. Abraham, C. Grosan and J. Thomas,200730114132Sekar, R., M. Bendre, P. Dhurjati and D. Bullineni,20012001pp: 144155Su-Yun, W. and E. Yen,20093656055612Tsai, C.F. and C.Y. Lin,201043222229Upadhyaya, S., R. Chinchani and K. Kwiat,20012001pp: 99108Wu, W.L., Y.S. Liu and J.H. Zhao,2007191618Xiang, C., M.Y. Chong and H.L. Zhu,20042004pp: 873878Zalik, K.R.,20082913851391Horng, S.J., M.Y. Su, Y.H. Chen, T.W. Kao, R.J. Chen, J.L. Lai and C.D. Perkasa,201138306313Powers, S.T. and J. He,200817830243042Toosi, A.N. and M. Kahani,20073022012212Xiang, C., P.C. Yong and L.S. Meng,200829918924